Zero Trust: Identity and Access Management

AWR351 – 5.00 Hours

Schedule

EC AWR351 3 Register

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.

Course Description

National Cybersecurity Preparedness Consortium logo      University of Memphis




This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner University of Memphis Center for Information Assurance. The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost.

The intent of this course is to increase the learners understanding of Zero Trust methodology, principles, and implementation with the goal of preparing organizations to face existing threats and adapt to new and emerging threats in the future. The course will cover the shift from perimeter-based security to Zero Trust by providing the foundational core principals, basic tenets, logical components, goals, and key benefits of Zero Trust reference architecture. It will also introduce the topic of Zero Trust implementation in an organization, providing a framework for successful implementation. 


Prerequisites

There are no prerequisites for this course.

Enrollment Requirements

Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid 

Course Completion Requirements

Participants must provide information for all required fields, including their U.S. citizenship/permanent resident information, in addition to meeting all other attendance and course completion requirements. If this information is not provided, the participant will be considered incomplete and will not receive a certificate of completion.

Participants must provide information for all required fields, including their U.S. citizenship/permanent resident information, in addition to meeting all other attendance and course completion requirements. If this information is not provided, the participant will be considered incomplete and will not receive a certificate of completion.

Participants must complete all course content and score a 70% or better on the Post-Test to receive a course certificate of completion.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignment, activities, quizzes and/or end of course exam.

To ensure participant success in this course, participants should possess:

  • Basic Microsoft Windows skills. 
  • Basic level of cybersecurity knowledge

Upon successful completion, you will be able to:

  • Understand the main goals, core principles, and basic tenets of a Zero Trust reference architecture.
  • Understand the foundations, key principles, logical components, the key benefits of a Zero Trust reference architecture, and the CISA Zero Trust maturity model.
  • Understand the important aspects of a successful Zero Trust implementation.

Suggested Audience

The target audience is anyone who has managerial or supervisory responsibility to make or influence decisions or policies regarding access to digital resources and services. This course is also beneficial for non-decision and policy makers. Participants should include those whose official duties are part of the strategic planning process associated with successful agency/organizational operation, data integrity and data security. 

Participants may be from disciplines including:

  • Critical Infrastructure managers
  • Information security and cybersecurity managers and personnel
  • Local government and private sector managers
  • Policymakers
  • Emergency Management

Other Information

After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.

Government Programs

Contact Information

Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]